lacework-global-627
Ensure server parameter 'audit_log_events' has 'CONNECTION' set for MySQL Database Server (Manual)
Profile Applicability
• Level 2
Description
Set audit_log_enabled to include CONNECTION on MySQL Servers.
Rationale
Enabling CONNECTION helps MySQL Database to log items such as successful and failed connection attempts to the server. Log data can be used to identify, troubleshoot, and repair configuration errors and suboptimal performance.
Impact
There are further costs incurred for storage of logs. For high traffic databases these logs will be significant. Determine your organization's needs before enabling.
Audit
From Azure Portal
- From Azure Home select the Portal Menu
- Select your Azure Database for MySQL server
- For each database, under the Settings section in the sidebar, select Server parameters
- Ensure the audit_log_enabled parameter is set to ON
- Review the event types to be logged by updating the audit_log_events parameter; ensure CONNECTION is set
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select Azure Database for MySQL servers.
- Select a database.
- Under Settings, select Server parameters.
- Update audit_log_enabled parameter to ON.
- Update audit_log_events parameter to have at least CONNECTION checked.
- Click Save.
- Under Monitoring, select Diagnostic settings.
- Select + Add diagnostic setting.
- Provide a diagnostic setting name.
- Under Categories, select MySQL Audit Logs.
- Specify destination details.
- Click Save. It may take up to 10 minutes for the logs to appear in the configured destination.
References
https://docs.microsoft.com/en-us/azure/mysql/single-server/how-to-configure-audit-logs-portal
https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-logging-threat-detection#lt-3-enable-logging-for-security-investigation
Additional Information
There is also a CLI version: https://docs.microsoft.com/en-us/azure/mysql/single-server/how-to-configure-audit-logs-cli